Besides enterprise visitor experience and security features, Proxyclick offers two identity access integration tools that are incredibly valuable to offices, factories, and industrial complexes requiring a secure way of streamlining the visitor entry process. The first one—ID Match—allows firms to automatically verify the identity of visitors by comparing the picture clicked on the iPad at the front desk with the visitor’s photo ID. If the images do not match, the system asks for an additional manual check. ID Match, which calculates a confidence score based on biometrics to ensure the two faces belong to the same person, is not only 100 percent GDPR-compliant but also respects all data privacy regulations. Committed to data privacy laws, Proxclick does not store any copies of IDs—only the picture and name of the visitor are saved. Additionally, ID Match allows organizations to stay audit-ready since they are aware of the visitors on-premises and can thereby prove regulatory compliance every time. ID Match keeps in line with key risk management and trade partnership programs such as C-TPAT (US), PIP (Canada) or AEO (Europe).
The second integration element is the access control integration feature. By combining their existing access control systems with a smart visitor sign-in app, organizations leveraging Proxyclick can share entry pass via email (with a QR code), track visitors on-premise and provide the right level of access to each visitor. For example, the same contractor who visits the premises frequently can either use existing access passes or use a combination of QR codes and passes. Proxyclick can be integrated with popular access control systems such as AC2000, AEOS, Lenel (Enterprise ACS), and C-CURE 9000.
Take, for example, the Brooklyn Navy Yard (the Yard). It’s an enormous hub of urban manufacturing, welcoming thousands of visitors and employees every day through seven gates located across their 300-acre industrial park in New York City. Until recently, the industrial complex managed visitor experience and security by using an internally-hosted web portal that was far from user-friendly and caused long lines and traffic at all seven multi-lane entry points. Since the solution wasn’t hosted on the cloud, visitor lists weren’t updated in real-time, and security checks had to be done manually by checking IDs against a printed watch list. Clearly, it was not a sustainable solution.
Unable to manage the heavy stream of visitors and shuttle busses at drive-through gates, front desks, and turnstiles, the Yard called on Proxyclick’s cutting-edge identity and access management (IAM) solution. By integrating with the Yard’s access control system, Proxyclick allows for pre-registration and vetting of visitors and contractors. This extra layer of security then triggers invitations emails to be sent.
Today, only visitors without an invitation email are asked to “check in” manually while those who are pre-registered can drive or walk through any of the Yard’s entry points by simply scanning their unique QR code from their invitational email.
Users have the option of categorizing different types of visitors through badges, pre-draft visitor invitations emails, and also design custom notifications for both employees and visitors
This level of sophistication in visitor experience and security is still sorely lacking across industries.
Proxyclick, a SaaS solution, is designed to remedy this. They strike a fine balance between providing a welcoming experience for visitors and enforcing stringent security measures. Though the solution was initially born as an antidote to solve inefficiencies associated with office front desks, Proxyclick gradually invested time and energy into the security aspect of the platform. Today, Proxyclick’s security features are so advanced that organizations can control a lot more than just unauthorized entry. “If Proxyclick is deployed at a food production site, it enables the company to ask questions to the visitors like if they are carrying a particular illness. Similarly, if a contractor is visiting a factory, Proxyclick can be programmed to have them sign an NDA or ask questions before allowing entry,” explains Blondeau. Besides letting visitors pre-register on their smartphones before arrival, Proxyclick also streamlines the exit process; a visitor can’t leave the premises until the front desk updates the dashboard status from “checked in” to “checked out.”
Such diverse features for security can be integrated into Proxyclick by feeding workflows and customizing settings in the centralized iPad at the front desk. In fact, the workflows can be duplicated across multiple branch offices. Blondeau explains the process that Proxyclick undertakes to deploy the platform. “After digitalizing visitor data, we synchronize the data with active directories to ensure employees receive notifications during visitor entry. Organizations using the solution have the option of categorizing different types of visitors through badges (of different colors), pre-draft visitor invitations emails (see the Yard use case), and also design custom notifications for both employees and visitors,” he says. Proxyclick once deployed the platform across 400 offices across the world within four months for the same client. “Rapid deployment is one of our biggest strengths,” adds Blondeau.
In the coming years, Proxyclick plans to add new integration tools to the platform and subsequently adapt to emerging trends. Blondeau believes that existing IAM processes will eventually be reversed. “Right now, the gates are always closed, and only the right person is allowed entry upon authorization. Tomorrow, as technologies evolve, security will be invisible as the gates will always be open, and automatically close on sensing unauthorized visitors,” he says. Proxyclick is also wary of emerging data privacy laws. “With California implementing data privacy laws similar to GDPR, organizations need to justify keeping data of visitors. The privacy of visitors can’t be compromised. We are monitoring all these trends and will alter our solutions accordingly,” Blondeau concludes.